Exam Logo

Comptia (CS0-002) Exam Questions And Answers page 9

Which of the following secure coding techniques can be used to prevent cross-site request forgery attacks?
Threat Management Cyber Incident Response
A security analyst is investigating a malware infection that occurred on a Windows system. The system was not connected to a network and had no wireless capability. Company policy prohibits using portable media or mobile storage. The security analyst is trying to determine which user caused the malware to get onto the system. Which of the following registry keys would MOST likely have this information?
Security Operations and Monitoring
A security analyst has received reports of very slow, intermittent access to a public-facing corporate server. Suspecting the system may be compromised, the analyst runs the following commands:


Based on the output from the above commands, which of the following should the analyst do NEXT to further the investigation?
Security Operations and Monitoring
Portions of a legacy application are being refactored to discontinue the use of dynamic SQL. Which of the following would be BEST to implement in the legacy application?
Security Architecture and Tool Sets Security Operations and Monitoring
A security analyst is reviewing the following log from an email security service.


Which of the following BEST describes the reason why the email was blocked?
Security Architecture and Tool Sets Security Operations and Monitoring
Which of the following is a best practice when sending a file/data to another individual in an organization?
Security Operations and Monitoring
Which of the following would a security engineer recommend to BEST protect sensitive system data from being accessed on mobile devices?
Threat Management Security Operations and Monitoring
A security analyst needs to perform a search for connections with a suspicious IP on the network traffic. The company collects full packet captures at the Internet gateway and retains them for one week. Which of the following will enable the analyst to obtain the BEST results?
Security Operations and Monitoring
A company recently experienced financial fraud, which included shared passwords being compromised and improper levels of access being granted. The company has asked a security analyst to help improve its controls. Which of the following will MOST likely help the security analyst develop better controls?
Threat Management Cybersecurity Tool Sets
An organization recently discovered some inconsistencies in the motherboards it received from a vendor. The organization s security team then provided guidance on how to ensure the authenticity of the motherboards it received from vendors. Which of the following would be the BEST recommendation for the security analyst to provide?
Threat Management